Pervasive and Mobile Computing最新文献

筛选
英文 中文
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition DA-HAR:用于环境无关WiFi人类活动识别的双对抗网络
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2023-10-27 DOI: 10.1016/j.pmcj.2023.101850
Long Sheng , Yue Chen , Shuli Ning , Shengpeng Wang , Bin Lian , Zhongcheng Wei
{"title":"DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition","authors":"Long Sheng ,&nbsp;Yue Chen ,&nbsp;Shuli Ning ,&nbsp;Shengpeng Wang ,&nbsp;Bin Lian ,&nbsp;Zhongcheng Wei","doi":"10.1016/j.pmcj.2023.101850","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101850","url":null,"abstract":"<div><p><span><span>As the cornerstone of the development of emerging integrated sensing and communication, human activity recognition technology based on WiFi signals has been extensively studied. However, the existing activity sensing models will suffer serious </span>performance degradation<span><span> when applied to new scenarios due to the influence of environmental dynamics. To address this issue, we present an environment-independent activity recognition model named DA-HAR, which utilizes dual adversarial network. The framework exploits adversarial training among source domain classifiers and source–target domain </span>discriminators to extract environment-independent activity features. To improve the performance of the model, a pseudo-label prediction based approach is introduced to assign labels to the target domain samples that closely resemble the source domain samples, thus mitigating the distribution deviation of activity features between source domain and target domain. Experimental results show that our proposed model has better cross-domain recognition performance compared to state-of-the-art recognition systems, especially when the distribution of activity features in the source domain and the target domain is significantly different, the accuracy is improved by 6.96% </span></span><span><math><mo>∼</mo></math></span> 11.22%.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"96 ","pages":"Article 101850"},"PeriodicalIF":4.3,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92014450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MRIM: Lightweight saliency-based mixed-resolution imaging for low-power pervasive vision mrm:用于低功耗普适视觉的轻量级显著性混合分辨率成像
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2023-10-27 DOI: 10.1016/j.pmcj.2023.101858
Ji-Yan Wu, Vithurson Subasharan, Tuan Tran, Kasun Gamlath, Archan Misra
{"title":"MRIM: Lightweight saliency-based mixed-resolution imaging for low-power pervasive vision","authors":"Ji-Yan Wu,&nbsp;Vithurson Subasharan,&nbsp;Tuan Tran,&nbsp;Kasun Gamlath,&nbsp;Archan Misra","doi":"10.1016/j.pmcj.2023.101858","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101858","url":null,"abstract":"<div><p><span><span>While many pervasive computing applications increasingly utilize real-time context extracted from a vision sensing infrastructure, the high energy overhead of DNN-based vision sensing pipelines remains a challenge for sustainable in-the-wild deployment. One common approach to reducing such energy overheads is the capture and transmission of lower-resolution images to an edge node (where the </span>DNN inferencing task is executed), but this results in an accuracy-vs-energy tradeoff, as the DNN inference accuracy typically degrades with a drop in resolution. In this work, we introduce </span><em>MRIM</em>, a simple but effective framework to tackle this tradeoff. Under <em>MRIM</em><span>, the vision sensor platform first executes a lightweight preprocessing step to determine the saliency of different sub-regions within a single captured image frame, and then performs a saliency-aware non-uniform downscaling of individual sub-regions to produce a “mixed-resolution” image. We describe two novel low-complexity algorithms that the sensor platform can use to quickly compute suitable resolution choices for different regions under different energy/accuracy constraints. Experimental studies, involving object detection tasks evaluated traces from two benchmark urban monitoring datasets as well as a prototype Raspberry Pi-based </span><em>MRIM</em> implementation, demonstrate <em>MRIM’s</em> efficacy: even with an unoptimized embedded platform, <em>MRIM</em><span> can provide system energy conservation of </span><span><math><mrow><mn>35</mn><mo>+</mo><mtext>%</mtext></mrow></math></span> (<span><math><mo>∼</mo></math></span>80% in high accuracy regimes) or increase task accuracy by <span><math><mrow><mn>8</mn><mo>+</mo><mtext>%</mtext></mrow></math></span><span>, over conventional baselines of uniform resolution downscaling or image encoding, while supporting high throughput. On a low power ESP32 vision board, </span><em>MRIM</em><span> continues to provide 60+% energy savings over uniform downscaling while maintaining high detection accuracy. We further introduce an automated data-driven technique for determining a close-to-optimal number of </span><em>MRIM</em> sub-regions (for differential resolution adjustment), across different deployment conditions. We also show the generalized use of <em>MRIM</em><span> by considering an additional license plate recognition (LPR) task: while alternative approaches suffer 35%–40% loss in accuracy, </span><em>MRIM</em> suffers only a modest recognition loss of <span><math><mo>∼</mo></math></span>10% even when the transmission data is reduced by over 50%.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"96 ","pages":"Article 101858"},"PeriodicalIF":4.3,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92108576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient concept drift handling for batch android malware detection models 有效的概念漂移处理批android恶意软件检测模型
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2023-10-20 DOI: 10.1016/j.pmcj.2023.101849
Borja Molina-Coronado , Usue Mori , Alexander Mendiburu , Jose Miguel-Alonso
{"title":"Efficient concept drift handling for batch android malware detection models","authors":"Borja Molina-Coronado ,&nbsp;Usue Mori ,&nbsp;Alexander Mendiburu ,&nbsp;Jose Miguel-Alonso","doi":"10.1016/j.pmcj.2023.101849","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101849","url":null,"abstract":"<div><p>The rapidly evolving nature of Android apps poses a significant challenge to static batch machine learning algorithms employed in malware detection systems, as they quickly become obsolete. Despite this challenge, the existing literature pays limited attention to addressing this issue, with many advanced Android malware detection approaches, such as Drebin, DroidDet and MaMaDroid, relying on static models. In this work, we show how retraining techniques are able to maintain detector capabilities over time. Particularly, we analyze the effect of two aspects in the efficiency and performance of the detectors: (1) the frequency with which the models are retrained, and (2) the data used for retraining. In the first experiment, we compare periodic retraining with a more advanced concept drift detection method that triggers retraining only when necessary. In the second experiment, we analyze sampling methods to reduce the amount of data used to retrain models. Specifically, we compare fixed sized windows of recent data and state-of-the-art active learning methods that select those apps that help keep the training dataset small but diverse. Our experiments show that concept drift detection and sample selection mechanisms result in very efficient retraining strategies which can be successfully used to maintain the performance of the static Android malware state-of-the-art detectors in changing environments.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"96 ","pages":"Article 101849"},"PeriodicalIF":4.3,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49767195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition 轻量化的精确触发器,以减少功耗传感器为基础的连续人体活动识别
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2023-10-05 DOI: 10.1016/j.pmcj.2023.101848
Emanuele Lattanzi, Lorenzo Calisti, Paolo Capellacci
{"title":"Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition","authors":"Emanuele Lattanzi,&nbsp;Lorenzo Calisti,&nbsp;Paolo Capellacci","doi":"10.1016/j.pmcj.2023.101848","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101848","url":null,"abstract":"<div><p>Wearable devices have become increasingly popular in recent years, and they offer a great opportunity for sensor-based continuous human activity recognition in real-world scenarios. However, one of the major challenges is their limited battery life. In this study, we propose an energy-aware human activity recognition framework for wearable devices based on a lightweight accurate trigger. The trigger acts as a binary classifier capable of recognizing, with maximum accuracy, the presence or absence of one of the interesting activities in the real-time input signal and it is responsible for starting the energy-intensive classification procedure only when needed. The measurement results conducted on a real wearable device show that the proposed approach can reduce energy consumption by up to 95% in realistic case studies, with a cost of performance deterioration of at most 1% or 2% compared to the traditional energy-intensive classification strategy.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"96 ","pages":"Article 101848"},"PeriodicalIF":4.3,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49764728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The geodesic mutual visibility problem: Oblivious robots on grids and trees 测地线相互可见性问题:网格和树木上的遗忘机器人
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101842
Serafino Cicerone , Alessia Di Fonso , Gabriele Di Stefano , Alfredo Navarra
{"title":"The geodesic mutual visibility problem: Oblivious robots on grids and trees","authors":"Serafino Cicerone ,&nbsp;Alessia Di Fonso ,&nbsp;Gabriele Di Stefano ,&nbsp;Alfredo Navarra","doi":"10.1016/j.pmcj.2023.101842","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101842","url":null,"abstract":"<div><p>The <span>Mutual Visibility</span> is a well-known problem in the context of mobile robots. For a set of <span><math><mi>n</mi></math></span> robots disposed in the Euclidean plane, it asks for moving the robots without collisions so as to achieve a placement ensuring that no three robots are collinear. For robots moving on graphs, we consider the <span>Geodesic Mutual Visibility</span>\u0000(<span><math><mi>GMV</mi></math></span>) problem. Robots move along the edges of the graph, without collisions, so as to occupy some vertices that guarantee they become pairwise geodesic mutually visible. This means that there is a shortest path (i.e., a “geodesic”) between each pair of robots along which no other robots reside. We study this problem in the context of trees and (finite or infinite) square grids, for robots operating under the standard Look–Compute–Move model. In both scenarios, we provide resolution algorithms along with formal correctness proofs, highlighting the most relevant peculiarities arising within the different contexts, while optimizing the time complexity.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101842"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49746298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy–Aware security protocol for IoT devices 物联网设备的能源感知安全协议
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101847
Malak Barari, Ramzi Saifan
{"title":"Energy–Aware security protocol for IoT devices","authors":"Malak Barari,&nbsp;Ramzi Saifan","doi":"10.1016/j.pmcj.2023.101847","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101847","url":null,"abstract":"<div><p><span>Internet of Things (IoT) has permeated various aspects of modern life, from smart homes to factories and even gardens. In the coming years, number of IoT devices is expected to surpass that of computers, laptops, mobile phones, and tablets. However, many of these devices are small and operate on batteries, making energy efficiency a significant challenge. This challenge affects all aspects of IoT, including security. To address this issue, we present an adaptive security approach in this paper. Adaptive security involves adjusting the </span>security level<span> based on the level of threats and data context, rather than always assuming the worst-case scenario. This approach reduces energy consumption and is implemented in three parts: 1) Adapting the length of RSA public and private keys, where longer keys provide more security but consume more power. 2) Adapting the trust level between nodes based on the history of the transmitting node, where the receiving node decides whether to verify the correctness of the received messages or not. 3) Utilizing TrustChain, which is transactional verification method inspired<span> by the blockchain concept.</span></span></p><p>We evaluated the performance of our proposed model through exhaustive simulation scenarios and experiments. Our approach outperforms state-of-the-art methods, with the variable key length approach reducing energy consumption by 50%, the trust level approach reducing energy consumption by approximately 50%, and the TrustChain approach reducing energy consumption to 0.771 J, while the blockchain-based method consumed 2.955 J to verify transactions.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"96 ","pages":"Article 101847"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49747530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavioural patterns discovery for lifestyle analysis from egocentric photo-streams 从以自我为中心的照片流中发现用于生活方式分析的行为模式
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101846
Martín Menchón , Estefania Talavera , José Massa , Petia Radeva
{"title":"Behavioural patterns discovery for lifestyle analysis from egocentric photo-streams","authors":"Martín Menchón ,&nbsp;Estefania Talavera ,&nbsp;José Massa ,&nbsp;Petia Radeva","doi":"10.1016/j.pmcj.2023.101846","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101846","url":null,"abstract":"<div><p>Automatic tools for the analysis of human behaviour are very important when aiming to understand the lifestyle of people. Egocentric wearable cameras allow the capture of images during long periods of time and in this way bring objective evidence of the experiences of the user.</p><p>In this paper, we propose a novel framework to discover behavioural patterns following an unsupervised greedy approach based on extracted image descriptors. The method collects and constructs time-frames to extract the semantics of user behaviour in terms of contextual information, such as places, activity, present objects, and others. Later, the similarity among the user time-frames is computed to assess correlations and thus obtain the user’s routine descriptors. To evaluate the performance of our method, we present several score metrics and compare them to state-of-the-art works in the field. We validated our method on 315 days and more than 390,000 images extracted from 14 users. Results show that behavioural patterns can be successfully discovered and that they are able to characterize the routine of people bringing important information about their lifestyle and behaviour change.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101846"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49746857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dynamic group key agreement scheme for UAV networks based on blockchain 一种基于区块链的无人机网络动态组密钥协商方案
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101844
Jie Zhou, Ming Luo, Lixin Song, Jinlin Hu
{"title":"A dynamic group key agreement scheme for UAV networks based on blockchain","authors":"Jie Zhou,&nbsp;Ming Luo,&nbsp;Lixin Song,&nbsp;Jinlin Hu","doi":"10.1016/j.pmcj.2023.101844","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101844","url":null,"abstract":"<div><p><span>In mobile ad hoc networks<span> (MANETs), group communication is an important communication mode, and group key<span> agreement technology is the key to ensure the security of group communication. Due to the influence of node movement, topology change and </span></span></span>network congestion<span><span><span> in MANETs, the traditional group key agreement technology has many security and performance problems, such as node authentication<span><span>, access control, data integrity, topology maintenance, routing protocol and so on. Therefore, we propose a certificateless dynamic group key protocol scheme based on blockchain, which can be used for </span>cluster communication in </span></span>unmanned aerial vehicle<span> (UAV). In our scheme, blockchain technology is used to realize the agreement of group keys, which protects privacy and ensures the transparency of the agreement process. All nodes can verify the generation process of the group key through the information recorded in the blockchain. Meanwhile, the consensus algorithm of blockchain can ensure that the process of generating group keys is fair and there is no interference from malicious nodes. In addition, we propose a certificateless </span></span>authentication protocol, which solves the problems of key escrow and batch authentication in traditional group key agreement technology. We have made formal security analysis and performance analysis, and the results show that this scheme is more secure and efficient than the existing certificateless group key protocol. This scheme can solve the problems existing in traditional group key agreement technology, such as key leakage and centralized management, and realize secure access control and key agreement mechanism. Therefore, this scheme is a safe and efficient solution, which can be effectively applied to the communication security of UAV network.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101844"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49746862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model for automatic selection of IoT services in ambient assisted living for the elderly 老年人环境辅助生活物联网服务自动选择模型
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101845
Luca Sabatucci , Massimo Cossentino , Claudia Di Napoli , Angelo Susi
{"title":"A model for automatic selection of IoT services in ambient assisted living for the elderly","authors":"Luca Sabatucci ,&nbsp;Massimo Cossentino ,&nbsp;Claudia Di Napoli ,&nbsp;Angelo Susi","doi":"10.1016/j.pmcj.2023.101845","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101845","url":null,"abstract":"<div><h3>Context:</h3><p>Engineering Ambient Assisted Living applications for the elderly is challenging due to the diversity and rapid changes of both end users’ needs and technological environment equipment.</p></div><div><h3>Objective:</h3><p>Assistive applications can be provided as combinations of functionalities provided by IoT devices. With the pervasive availability of functionally equivalent IoT devices, they should be selected according to the specific deployment context in terms of user needs and conditions, device availability, and regulations when the operative context dynamic conditions can be set. Such selection is the objective of this work.</p></div><div><h3>Methods:</h3><p>We rely on a conceptual framework for self-adaptation as the enabler for a run-time decision-making process. It allows for representing relations among IoT devices, the functionalities they deliver, and the different modalities these functionalities are provided with in terms of goals, devices, and norms. The framework is based on three fundamental principles: (1) high-level abstractions separating the expected functionality, how it can be delivered, and who is responsible for its delivery; (2) AAL applications as the run-time composition of atomic functionalities; (3) centrality of the user in the system.</p></div><div><h3>Result:</h3><p>The Device-Goal-Norm framework is proposed to specify diagrams for different AAL applications, together with the semantics to transform these diagrams into run-time models. We also provide a running implementation of a run-time model based on the belief–desire–intention paradigm.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101845"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49764547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A puf-based three-party authentication key establishment scheme for fog-enabled smart home 基于puf的雾智能家居三方认证密钥建立方案
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101843
Huan Yang , Yajun Guo , Yimin Guo
{"title":"A puf-based three-party authentication key establishment scheme for fog-enabled smart home","authors":"Huan Yang ,&nbsp;Yajun Guo ,&nbsp;Yimin Guo","doi":"10.1016/j.pmcj.2023.101843","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101843","url":null,"abstract":"<div><p>With the rise of Internet of Things<span><span> (IoT), the smart home is another emerging concept and application of IoT, where security and private data of devices are important. In this paper, fog computing<span><span> is applied to the smart home environment, where fog can provide many smart features and services to the smart home. Fog computing has many advantages, such as low latency and real-time interaction. However, when fog computing is combined with smart home, it also faces some security threats: first, some fog nodes and smart home devices are deployed in public places, vulnerable to damage or theft by attackers, not considered fully trusted, and vulnerable to device loss/theft attacks, impersonation attacks, and message tampering attacks, etc. These threats can lead to adversaries controlling devices in the smart home or modifying messages to make smart home devices execute wrong commands, causing irreparable damage; Second, the </span>smart home system<span> should have good real-time interaction, and the authentication process using the low latency feature of fog computing should not be involved by the cloud. Considering these, it is necessary to design a secure and effective fog-enabled smart home </span></span></span>authentication system<span><span> that is secure against various known attacks, especially when the fog node is not fully trusted or the smart home device is captured as well. Finally, the authentication scheme should also be lightweight due to the limited resources of many smart home devices. To address these issues, this paper proposes a lightweight authentication scheme for the fog-enabled smart home system. It also employs a physical unclonable function to achieve mutual authentication among three parties: smart home devices, fog nodes and users. Formal security analysis under the Real-Or-Random model shows that this scheme is </span>provably secure. And informal security analysis shows that our scheme is robust against various known attacks. At the same time, the proposed scheme requires less computation cost (8.239 ms) and is approximately 40% to 390% faster than existing related schemes. Although the communication cost is slightly higher (4512 bits), it is reasonable because the proposed scheme implements fog/gateway node compromised attack that has not been achieved by any other existing related schemes.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"95 ","pages":"Article 101843"},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49764543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信